Visitor Access Control Scheme Utilizing Social Relationship in the Real World

نویسندگان

  • Gen Kitagata
  • Debasish Chakraborty
  • Satoshi Ogawa
  • Atsushi Takeda
  • Kazuo Hashimoto
  • Norio Shiratori
چکیده

Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor access because of maintenance costs and inadequacy in safeness. In this paper, we focus on a visitor access control in the real world, by utilizing relationship with users and situations, and propose a novel access control scheme which is effective for temporal activities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

D-Log: A WiFi Log-based differential scheme for enhanced indoor localization with single RSSI source and infrequent sampling rate

Currently, large amounts of Wi-Fi access logs are collected in diverse indoor environments, but cannot be widely used for fine-grained spatio-temporal analysis due to coarse positioning. We present a Log-based Differential (D-Log) scheme for post-hoc localization based on differentiated location estimates obtained from large-scale Access Point (AP) logs of WiFi connectivity traces, which can be...

متن کامل

Social Determinants of Equity in Access to Healthcare for Tuberculosis Patients in Republic of Macedonia – Results from a Case-Control Study

Background Health is a complex phenomenon and equity as a basic human right an integral part of constitutions in almost all countries in the world. In Republic of Macedonia (RM), Tuberculosis (TB) is clustered regionally and in certain ethnic groups. The main objective of this study was to analyze Social Determinants of Health (SDH) and equity in access to healthcare services for TB patients in...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Robust stabilization of a class of three-dimensional uncertain fractional-order non-autonomous systems

  This paper concerns the problem of robust stabilization of uncertain fractional-order non-autonomous systems. In this regard, a single input active control approach is proposed for control and stabilization of three-dimensional uncertain fractional-order systems. The robust controller is designed on the basis of fractional Lyapunov stability theory. Furthermore, the effects of model uncertai...

متن کامل

Real-Time Building Information Modeling (BIM) Synchronization Using Radio Frequency Identification Technology and Cloud Computing System

The online observation of a construction site and processes bears significant advantage to all business sector. BIM is the combination of a 3D model of the project and a project-planning program which improves the project planning model by up to 6D (Adding Time, Cost and Material Information dimensions to the model). RFID technology is an appropriate information synchronization tool between the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010